Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

Microprocessors and Microsystems 80 (2021) 103607

Contents lists available at ScienceDirect

Microprocessors and Microsystems


journal homepage: www.elsevier.com/locate/micpro

An Internet of Things assisted Unmanned Aerial Vehicle based artificial


intelligence model for rice pest detection
Sourav Kumar Bhoi a , Kalyan Kumar Jena a , Sanjaya Kumar Panda b , Hoang Viet Long c,d ,∗,
Raghvendra Kumar e , P. Subbulakshmi f , Haifa Bin Jebreen g
a
Department of Computer Science and Engineering, Parala Maharaja Engineering College (Govt.), Berhampur 761003, India
b Department of Computer Science and Engineering, National Institute of Technology, Warangal 506004, India
c Division of Computational Mathematics and Engineering, Institute for Computational Science, Ton Duc Thang University, Ho Chi Minh City, Vietnam
d
Faculty of Mathematics and Statistics, Ton Duc Thang University, Ho Chi Minh City, Vietnam
e
Department of Computer Science and Engineering, Gandhi Institute of Engineering and Technology University, Gunupur 765022, India
f
School of Computing, Scope, VIT University, Chennai Campus, Tamilnadu, India
g
Department of Mathematics, College of Science, King Saud University, P.O. Box 2455, Riyadh 11451, Saudi Arabia

ARTICLE INFO ABSTRACT

Keywords: Rice is a very essential food for the survival of human society. Most of the people focus on production of rice
Internet of Things for their financial gain as well as their survival in the society. Rice production means a lot, not only for the
Unmanned Aerial Vehicle farmers, but also for the entire human society However, it is very difficult to protect the rice during and after
Rice pest detection
the production due to several reasons, such as natural calamities, heavy rain fall, flood, earthquakes, damage
Imagga cloud
of rice due to pests, etc. Damage of rice can occur during production and after the production due to several
Artificial intelligence
Confidence value
pests. So, it is very much essential to identify the pests in the rice so that preventive measures can be taken
for its protection. In this paper, an Internet of Things (IoT) assisted Unmanned Aerial Vehicle (UAV) based
rice pest detection model using Imagga cloud is proposed to identify the pests in the rice during its production
in the field. The IoT assisted UAV focuses on artificial intelligence (AI) mechanism and Python programming
paradigm for sending the rice pest images to the Imagga cloud and providing the pest information. The Imagga
cloud detects the pest by finding the confidence values with the tags. The tag represents the object in that
image. The tag with maximum confidence value and beyond threshold is selected as the target tag to identify
the pest. If pest is detected then the information is sent to the owner for further actions. The proposed method
can able to identify any kind of the pest that affects the rice during production. Alternatively, this paper
attempts to minimize the wastage of rice during its production by monitoring the pests at regular intervals.

1. Introduction used for such purpose. IoT refers to the system of smart devices which
receive and transfer data over wireless network without any human
Most of the people depend on rice as food for their survival in intervention [33–38]. The UAV can be considered as an aircraft without
the planet. Rice acts as a source for quick energy, vitamins, minerals, any human pilot on board and it is type of unmanned vehicle. UAV is
fibers, etc. Several categories of rice, such as white rice, brown rice, also considered as flying IoT. AI is considered as an essential concern
jasmine rice, basmati rice, arborio rice, sticky rice, parboiled rice, for the identification of pests in the rice field. AI can be referred to the
short grain, medium grain and large grain rice, wild rice, forbidden simulation of human intelligence in the machines like UAVs, which are
rice, polished rice, etc., are available in the market. However, it is a programmed to think like humans and mimic their actions for detecting
very difficult task to protect rice during production as well as after the pests in the rice field. Cloud computing [39–52] mechanism plays
production due to several factors in current scenario. But, damage of
an important role for the surveillance as well as identification of
rice due to pests during production and after production is an important
pest during rice production by the help of high definition UAVs. It
concern. Several methods can be used to monitor the pests regularly
refers to the availability of system resources on-demand specifically for
during and after the rice production in order to prevent damage of
computing and data storage without any active management directly by
rice. The monitoring device such as IoT assisted UAV [1–32] can be

∗ Corresponding author.
E-mail addresses: souravbhoi@gmail.com (S.K. Bhoi), kalyankumarjena@gmail.com (K.K. Jena), sanjayauce@gmail.com (S.K. Panda),
hoangvietlong@tdtu.edu.vn (H.V. Long), raghvendra@giet.edu (R. Kumar), subbu.psk@gmail.com (P. Subbulakshmi), hjebreen@ksu.edu.sa (H.B. Jebreen).

https://doi.org/10.1016/j.micpro.2020.103607
Received 18 September 2020; Received in revised form 29 November 2020; Accepted 30 November 2020
Available online 7 December 2020
0141-9331/© 2020 Elsevier B.V. All rights reserved.
S.K. Bhoi et al. Microprocessors and Microsystems 80 (2021) 103607

the user. It is mainly used to illustrate data centers which are available canopy as well as the protection efficiency against the hoppers (plant).
to several users through the Internet. As the IoT assisted UAVs will In this work, the spraying parameters are optimized by preventing the
monitor the rice field in regular intervals by capturing the images, plant hoppers. Here, the droplets coverage rates on the rice canopy as
so there is requirement of adequate amount of memory for storing well as the lower layer are analyzed. The summary of related work with
as well as processing of several images. Hence, cloud computing can their pros and cons is shown in Table 1.
be considered as a solution for this problem by utilizing its several
layers, such as application layer and cloud infrastructure layer, and 3. Proposed model
the cloud platform. It is specifically used to store the images captured
by IoT assisted UAV for further processing. In this work, we have This section describes about the proposed rice pest detection model.
mainly focused on IoT assisted UAV based pest detection model that In this model, there are four phases such as data acquisition phase, UAV
uses AI mechanism, Imagga cloud [53] and Python language [54] for to cloud server provider (CSP) phase, computing phase or pest detection
the processing of several pest images. The main contributions of this phase, CSP to field owner communication phase. Fig. 1 describes about
work can be stated as follows. the whole system model where the four phases are completely shown.
Fig. 2 also shows the CSP communication between the UAV node and
– An IoT assisted UAV based rice pest detection model focusing on
field owner.
AI mechanism is proposed to identify the pest in the rice during
the production in the field.
3.1. Methodology
– Imagga cloud [53] is used to provide information related to type
of pest that affects the rice. The rice pest images are sent to
Imagga cloud by the help of IoT assisted UAV that focuses on The monitoring mechanisms of pests in the rice field during the
Python programming paradigm for providing the pest informa- rice production are presented in Figs. 1 and 2. According to these
tion. The cloud provides tags to the objects in the image with a figures, the UAV node monitors a rice field periodically by a rice field
confidence value. owner for pest detection during the production of rice. Here, a UAV
– The tag with the maximum confidence value and beyond thresh- continuously takes images of the whole field and transfers the data to
old is selected as the target tag to identify the pest. the CSP by requesting to process the images, using Internet connection
– If the rice is affected by any kind of pests then such information (4G communications). The CSP stores the images that are sent by the
will be send to the field owner immediately in order to take the UAVs at regular intervals and then process the images to check whether
preventive actions. there is any pest or not in the rice field. The processing is carried
out by using several layers of CSP such as cloud infrastructure layer,
The rest of the chapter is organized as follows. Sections 2–5 de- application layer as well as cloud platform. The computation unit of
scribe the related works, proposed model, results and discussion, and cloud infrastructure layer is mainly used for identification of pests by
conclusion of the work, respectively. processing several images. Here, the imagga API is used to generate
the tags with their confidence values (in %) after processing several
2. Related work images that are taken from rice field. If any pest is detected then it can
be identified by using the tag which is having highest confidence value.
Several works have carried out by the researchers for the rice In our work, we have considered the minimum confidence value to be
pest detection [1–19,39–43,55–94]. Some of the works are described 75% which can be referred to as minimum threshold value. Algorithm 1
as follows. Zhou et al. [1] proposed an enhanced area based fully describes the pest identification mechanism by taking <tag, confidence
convolutional networks panicle identification and counting system in value> as the input. If the pest is identified then its information is
order to detect and count the rice in the field and this system can immediately sent to rice field owner by using python language. The
be used to automate the rice phenotype measurements. In this work, GET request authentication as well as POST request mechanisms are
the images are collected by the help of high definition RGB camera used for communicating this information to the field owner to take
based UAV. Here, the irregular edge of the rice panicle is focused. immediate preventative action so that the damage of rice during pro-
Liu et al. [6] proposed a UAV based computer vision system to iden- duction can be avoided. Generally, the UAV communication device has
tify the agricultural airboat position information which is used in several hardware components, such as fuselage, plane wings, tail rotor,
autonomous fertilizing as well as herbicide applications. The presented canopy, multi-rotor frame, arms, batteries, sensors and actuators, to
system can inspect the paddy field by the help of UAV. The UAV can carry out its operation. The UAV should integrate with 50 megapixel
be used to identify the airboat location using white color as well as high resolution camera to track the pests in a better way. For this work,
central symmetrical contour features of the airboat and then sends we have focused on Lemmas 1–4 with their proof which are mentioned
the information of location to airboat by the help of Bluetooth for below.
the navigation of airboat. Barrero et al. [10] proposed a method to
fuse high resolution RGB and low resolution multispectral images for Lemma 1. UAV sends an image I of size 𝑏 bits to the CSP. The total delay
identifying the Gramineae weed in case of rice fields dealing with plants to transfer data to CSP is 𝑡𝑏 .
by considering fifty days after emergence. Fixed wing UAV is used to
capture the images with altitude 60 and 70 m. M/MGT index and MP Proof. Let a UAV sends an image of size 𝑏 bits to CSP as mentioned
index are used as performance metrics. in Fig. 3. Let the internet delay to 𝑏 bits message to CSP is 𝑡𝑏 . 𝑡𝑏 can be
Li et al. [11] focus on Capsnet to track rice images. UAV is used computed using Eq. (1).
to capture the rice images. Histogram equalization and superpixel
algorithm are used to preprocess the images. The Capsnet is used to 𝑏 𝑑
𝑡𝑏 = + + (𝑡𝑞𝑢𝑒𝑢𝑒 + 𝑡𝑝𝑟𝑜𝑐𝑒𝑠𝑠𝑖𝑛𝑔 ) (1)
train classification and the output vector is predicted by focusing on 𝑟 𝑐
routing by agreement protocol. Kitpo et al. [57] proposed an IoT based where, 𝑟 is the data rate, 𝑐 is speed of light, 𝑑 is the distance through
drone implementation system for the detection and classification of which the data packets forwarded (routing path), 𝑡𝑞𝑢𝑒𝑢𝑒 is the packets
rice diseases. In this work, image processing technique is used for the queuing time and 𝑡𝑝𝑟𝑜𝑐𝑒𝑠𝑠𝑖𝑛𝑔 is the CPU processing time for the process.
acquisition as well as analysis of data. This system can identify the We have only considered transmission delay and communication delay.
location of infected rice plants and it takes the help of GPS sensor. Qin
et al. [16] focus on the impact of spraying parameters such as operation Lemma 2. The CSP provides proper service to n users by using the M/M/1
velocity and height of UAV on the droplet deposition in case of rice queuing model.

2
S.K. Bhoi et al. Microprocessors and Microsystems 80 (2021) 103607

Table 1
A summary of related work.
Method Main focus Pros Cons
Zhou et al. [1] Enhanced area based fully To track and count the rice in the Training process needs to be improved
convolutional networks panicle field using deep learning model
identification and counting system to
detect and count the rice in the field
Liu et al. [6] UAV based computer vision system To track the agricultural airboat Improved paddy field recognition
to identify the agricultural airboat position information using UAV method and airboat detection the
position information used in algorithm needs to be proposed to
autonomous fertilizing and herbicide recognize the irregular shape of paddy
applications field without markers and to separate
the airboat body and the white wake
Barrero et al. [10] Method to fuse high resolution RGB To track the Gramineae weed in the More experimental analysis is required
and low resolution multispectral rice fields using UAV to produce more accurate results
images to identify the Gramineae
weed in the rice fields
Li et al. [11] UAV and Capsnet mechanism to To track rice images using UAV The sample size needs to be increased
track rice images based capsule network under different external conditions to
gain better results and automatic
identification of crop diseases and pests
needs to be initiated
Qin et al. [16] Impact of spraying parameters, such Controlling of plant hoppers using The improved technique needs to be
as operation velocity and height of UAV based mechanism developed for better performance
UAV on the droplet deposition in
rice canopy and the protection
efficiency against the plant hoppers
Kitpo et al. [57] IoT based drone implementation Rice disease detection and position Improved algorithm and system need to
system for the detection and mapping system using drone and IoT be developed to capture on-demand
classification of rice diseases Architecture imagery from flying and scanning the
rice field using the drone.

Fig. 1. Proposed methodology.

Proof. Let 𝑛 users send 𝑛 rice pest images of size 𝑏 bits to CSP which is Proof. Let 𝑛 UAVs are there, such as 𝑈1 , 𝑈2 , …, 𝑈𝑛 . From Eq. (2),
denoted by set 𝐵 {𝑏1 , 𝑏2 , 𝑏3 , …, 𝑏𝑛 } for pest detection. M/M/1 model each user takes 𝑡𝑒1 , 𝑡𝑒2 , …, 𝑡𝑒𝑛 time, respectively. Therefore, 𝑇𝑒 can be
uses first come first serve (FCFS) policy for processing the images at computed using Eq. (3).
CSP. Therefore, the average time a data of size 𝑏 bits exists in the system
𝑇𝑒 = 𝑡𝑒1 + 𝑡𝑒2 + ⋯ + 𝑡𝑒𝑛 (3)
is calculated using Eq. (2).
𝜆 1 According to Fig. 2, the CSP deals with application layer, cloud
𝑡𝑒 = + (2) platform and cloud infrastructure layer. The application layer is used
(𝜇 × (𝜇 − 𝜆)) 𝜇
for providing the rice pest identification service by using computing
where, 𝜆 denotes data arrival rate per unit time and 𝜇 is the data service as a service (CaaS). This layer provides several applications of cloud
rate per unit time and 𝜆 < 𝜇. without any installation on the system which can be directly used by
the user. These applications can be saved and edited on the cloud.
Lemma 3. If 𝑛 users are there, then CSP takes total 𝑇𝑒 time for processing The cloud platform focuses on cloud application platform especially
and queuing. for the developers. The infrastructure layer consists of storage unit and

3
S.K. Bhoi et al. Microprocessors and Microsystems 80 (2021) 103607

Fig. 2. CSP communication mechanism.

computation unit. The storage unit stores the rice pest images received
from 𝑛 users. The computation unit uses the <Imagga API> to identify
the pests in the images. Imagga API [53] is an application to provide
services to users (UAV) by classifying objects on the basis of <tags>.
UAV sends data (image) by requesting using python language. The
following code is used to process the image at CSP [53] (GET and Fig. 3. Message sending mechanism.
POST).

3.1.1. GET request authentication


response = requests.post(
’https://api.imagga.com/v2/tags’,
import requests auth=(api_key, api_secret),
files={’image’: open(image_path, ’rb’)})
api_key = ’<api-key>’ print(response.json())
api_secret = ’<api-secret>’
image_url = ’https://imagga.com/static/images/
tagging/image.jpg’ The API.autotags after authentication posting the necessary request.
Get request authentication deals with api_key, api_secret, image-url,
response = requests.get( response and print using response.json() mechanism. Post request deals
’https://api.imagga.com/v2/tags?image_url=%s’ with api-key, api-secret, image_path, response as well as print using
% image_url, response.json() mechanism. Get request authentication and Post re-
auth=(api_key, api_secret)) quest mechanisms are mentioned above. The result consists of autotags
and confidence value or accuracy to the tag that is given between
print(response.json()) 0%–100%. After processing the image using imagga API at CSP, CSP
analyzes the result by finding the tags with higher confidence value
3.1.2. POST request and its threshold value is 75%. The tags like pest <insert, arthropod,
leafhopper, grasshopper, etc.> are considered as pest. If it is defected
the pest information is set to user. Then, the owner takes necessary
import requests action to save the rice plants. The GET and POST request mechanisms
are mainly useful for communication of UAVs with the CSP as well as
api_key = ’<api-key>’ the CSP with the field owner.
api_secret = ’<api-secret>’
image_path = ’/path/to/the/image.jpg’ Lemma 4. The total delay a user (𝑈1 ) takes to get the service is 𝑇𝑠𝑒𝑟𝑣𝑖𝑐𝑒 .

4
S.K. Bhoi et al. Microprocessors and Microsystems 80 (2021) 103607

Table 2
Tags with confidence value for pest image-1.
Tags Confidence value (in %)
Leafhopper 100
Insect 100
Arthropod 85.22
Invertebrate 52.59
Close 34.79
Bug 30.22
Garden 29.33
Plant 29.09
Leaf 26.45
Fly 26.20

Proof. Let a UAV 𝑈1 sends data to CSP it takes to delay (according to


Eq. (1)). The average time a message of size 𝑏 bits exists in the system
is 𝑡𝑒 . Let the total processing time used by imagga API to generate tags
and confidence value is 𝑡𝑝 .
Let the delay to identify the pests by using the tags and confidence
value (Algorithm 1) is 𝑡𝑑 . Hence, total delay to send data to the field
owner is represented by 𝑇𝑠𝑒𝑟𝑣𝑖𝑐𝑒 as mentioned in Eq. (4). Fig. 4. Pest image-1 with size 683 × 1024 [95].

𝑇𝑠𝑒𝑟𝑣𝑖𝑐𝑒 = 𝑡𝑏 + 𝑡𝑒 + 𝑡𝑝 + 𝑡𝑑 + 𝑡𝑖 (4)

where, 𝑡𝑖 is the Internet delay to send pest information to the field


owner.
As per the analysis of Lemma 1, when the UAV wants to send an
image of size of 𝑏 bits to CSP, then the total delay is 𝑡𝑏 . As per the
analysis of Lemma 2, 𝑛 users can get proper service by the CSP by the
help of M/M/1 queuing model. As per the analysis of Lemma 3, the
CSP can take 𝑇𝑒 time for processing and queuing 𝑛 users. As per the
analysis of Lemma 4, the user requires 𝑇𝑠𝑒𝑟𝑣𝑖𝑐𝑒 time to get the service.
Lemmas 1–4 play an important role to monitor the rice pest in the field
by the UAVs, which in turn helps the field owner to track the status of
the rice field at regular time intervals.

Algorithm 1 Pest detection using tags, confidence value and threshold Fig. 5. Pest identification from pest image-1 according to tags and confidence value.
Input: Tags, Confidence (%), threshold (𝑡ℎ)
Output: Pest Detection (1/0)

1: for 𝑖 = 1 to 𝑛 tags do
2: if (tag, confidence value) > th (%) then
3: 𝐵[] = tag; ⊳ 𝐵 = Buffer
4: end if
5: end for
6: for 𝑖 = 1 to sizeof(𝐵) do
7: if 𝐵(𝑖) == Pest then
8: Pest Detected
9: Send (1) to Field Owner ⊳ 1 = pest detected
10: end if
11: end for

4. Results and discussion

The performance is evaluated in a machine of 64-bit operating Fig. 6. Pest image-2 with size 1024 × 679 [95].
system with 4 GB RAM, and 3.3 GHz frequency. The language used
for sending request to the cloud to provide computing as a service
(CaaS) is Python. The CaaS is provided using the imagga API [53] the identification of pests as the pest belongs to such tag which is
by the cloud service provider. The pest images are taken from the having highest confidence value and the threshold value for confidence
source [95] for identifying the pests in the rice pest images. Here,
value is 75% in our work. The processing result of Fig. 4 is mentioned
several pest images are considered for showing the performance of rice
in Fig. 5 and Table 2. From Fig. 5 and Table 2, it is observed that
pest detection model as mentioned in Figs. 4, 6, 8, 10, 12 and 14. The
results are mentioned in Figs. 5, 7, 9, 11, 13, 15 and Tables 2 to 7. after processing of pest image mentioned in Fig. 4, possible tags with
After processing of different pest images, the tags and the confi- the confidence values are generated as leafhopper-100, insect-100,
dence values (in %) are generated for each image. In our work, we arthropod-85.22, invertebrate-52.59, close-34.79, bug-30.22, garden-
have mainly focused on the tags having highest confidence values for 29.33, plant-29.09, leaf-26.45, fly-26.20. From the tags and confidence

5
S.K. Bhoi et al. Microprocessors and Microsystems 80 (2021) 103607

Table 3
Tags with confidence value for pest image-2.
Tags Confidence value (in %)
Leafhopper 100
Insect 100
Arthropod 79.07
Invertebrate 43.02
Plant 42.66
Garden 37.72
Grass 36.37
Leaf 33.46
Bug 30.23
Spring 29.04

Table 4
Fig. 7. Pest identification from pest image-2 according to tags and confidence value. Tags with confidence value for pest image-3.
Tags Confidence value (in %)
Leafhopper 76.68
Insect 73.28
Plant 59.13
Horsetail 49.54
Fern Ally 38.85
Grass 38.73
Arthropod 37.68
Garden 32.69
Vascular Plant 29.46
Leaf 28.01

Fig. 8. Pest image-3 with size 197 × 282 [95].

Fig. 10. Pest image-4 with size 598 × 761 [95].

values, it is observed that the processed pest is a leafhopper and it is


an insect as the confidence value is 100% in this case.
The processing result of Fig. 6 is mentioned in Fig. 7 and Ta-
ble 3. From Fig. 7 and Table 3, it is observed that after processing
of pest image mentioned in Fig. 6, possible tags with the confidence
values are generated as leafhopper-100, insect-100, arthropod-79.07,
Fig. 9. Pest identification from pest image-3 according to tags and confidence value. invertebrate-43.02, plant-42.66, garden-37.72, leaf-33.46, bug-30.23,

6
S.K. Bhoi et al. Microprocessors and Microsystems 80 (2021) 103607

Table 5
Tags with confidence value for pest image-4.
Tags Confidence value (in %)
Walking Stick 100
Insect 100
Arthropod 82.62
Mantis 64.52
Invertebrate 51.54
Cricket 36.61
Close 34.24
Wildlife 33.87
Leaf 32.67
Grasshopper 28.15

Table 6
Tags with confidence value for pest image-5. Fig. 13. Pest identification from pest image-5 according to tags and confidence value.
Tags Confidence value (in %)
Leafhopper 100
Insect 100
Arthropod 55.95
Plant 40.08
Invertebrate 35.05
Animal 31.13
Garden 30.99
Grass 29.22
Leaf 27.99
Close 27.94

Fig. 11. Pest identification from pest image-4 according to tags and confidence value.

Fig. 14. Pest image-6 with size 448 × 663 [95].

The processing result of Fig. 8 is mentioned in Fig. 9 and Ta-


ble 4. From Fig. 9 and Table 4, it is observed that after processing
of pest image mentioned in Fig. 8, possible tags with the confidence
values are generated as leafhopper-76.68, insect-73.28, plant-59.13,
horsetail-49.54, fern ally-38.85, grass-38.73, arthropod-37.68, garden-
32.69, vascular plant-29.46, leaf-28.01. From the tags and confidence
Fig. 12. Pest image-5 with size 500 × 375 [95].
values, it is observed that the processed pest is a leafhopper as the
confidence value for leafhopper is 76.68 in this case.
The processing result of Fig. 10 is mentioned in Fig. 11 and Ta-
spring-29.04. From the tags and confidence values, it is observed that
ble 5. From Fig. 11 and Fig. 4, it is observed that after processing
the processed pest is also a leafhopper and it is an insect as the of pest image mentioned in Fig. 10, possible tags with the confidence
confidence value is 100% in this case. values are generated as walking stick-100, insect-100, arthropod-82.62,

7
S.K. Bhoi et al. Microprocessors and Microsystems 80 (2021) 103607

Table 7
Tags with confidence value for pest image-6.
Tags Confidence value (in %)
Leafhopper 100
Insect 100
Arthropod 79.55
Invertebrate 47.19
Plant 32.07
Garden 31.83
Leaf 25.66
Wildlife 24.95
Close 24.53
Grass 24.49 Fig. 16. Processing time to get service from imagga cloud.

This model focuses on AI mechanism to carry out the pest detection


process in the rice field. This work mainly uses Imagga cloud for the
identification of pests. The pest can be identified by taking the tag with
highest confidence value and its threshold value is considered as 75%.
The IoT assisted UAV is used for sending pest images to the Imagga
cloud. It monitors the rice field at regular time intervals by capturing
the rice pest images. The Imagga cloud is used to find out different
kinds of pests by the help of tags and confidence values. The Python
programming paradigm is used for communicating information related
to presence of pests in the rice field. From the results, it is observed
that the proposed approach identifies the types of pests that affect
the rice in the field by processing several pest images. The proposed
work can able to identify any kind of pest that affect the rice during
Fig. 15. Pest identification from pest image-6 according to tags and confidence value. production in a better way and it can help the farmers to protect
their rice during production. This work can be extended to develop an
improved method to monitor the post production of rice in a better way
mantis-64.52, invertebrate-51.54, cricket-36.61, close-34.24, wildlife- by using advance techniques [96–103]. In this paper, an attempt has
33.87, leaf-32.67, grasshopper-28.15. From the tags and confidence been made to monitor the pests during the production of rice, so that
values, it is observed that the processed pest is a walking stick and it the wastage of rice can be minimized. This work can also be extended
is also an insect as the confidence value is 100% in this case. to develop an automated integrated system to monitor the rice during
The processing result of Fig. 12 is mentioned in Fig. 13 and Table 6. its production as well as its post-production activities in a better way.
From Fig. 13 and Table 6, it is observed that after processing of pest
image mentioned in Fig. 12, possible tags with the confidence values Declaration of competing interest
are generated as leafhopper-100, insect-100, arthropod-55.95, plant-
40.08, invertebrate-35.05, animal-31.13, garden-30.99, grass-29.22, The authors declare that they have no known competing finan-
leaf-27.99, close-27.95. From the tags and confidence values, it is cial interests or personal relationships that could have appeared to
observed that the processed pest is a leafhopper and it is an insect as influence the work reported in this paper.
the confidence value is 100% in this case.
The processing result of Fig. 14 is mentioned in Fig. 15 and Table 7. Acknowledgments
From Fig. 15 and Table 7, it is observed that after processing of
pest image mentioned in Fig. 14, possible tags with the confidence This project was supported by Researchers Supporting Project num-
values are generated as leafhopper-100, insect-100, arthropod-79.55, ber (RSP-2020/210), King Saud University, Riyadh, Saudi Arabia.
invertebrate-47.19, plant-32.07, garden-31.83, leaf-25.66, wildlife-
24.96, close-24.53, grass-24.49. From the tags and confidence values, References
it is observed that the processed pest is also a leafhopper and it is
an insect as the confidence value is 100% in this case. Fig. 16 shows [1] Chengquan Zhou, Hongbao Ye, Jun Hu, Xiaoyan Shi, Shan Hua, Jibo Yue, Zhifu
Xu, Guijun Yang, Automated counting of rice panicle by applying deep learning
the processing time Imagga cloud take to give the results. However,
model to images from unmanned aerial vehicle platform, Sensors 19 (14) (2019)
we have not considered the total processing time. From the results, it 3106.
is observed that after processing of several pest images as mentioned [2] Md Nasim Reza, In Seop Na, Sun Wook Baek, Kyeong-Hwan Lee, Rice yield
above, the identified pest is a leafhopper in Figs. 4, 6, 8, 12 and 14 and estimation based on K-means clustering with graph-cut segmentation using
it is a walking stick in Fig. 10. From the above analysis of results, it is low-altitude UAV images, Biosyst. Eng. 177 (2019) 109–121.
[3] Qi Jiang, Shenghui Fang, Yi Peng, Yan Gong, Renshan Zhu, Xianting Wu, Yi Ma,
concluded that the proposed method is able to track different types
Bo Duan, Jian Liu, UAV-based biomass estimation for rice-combining spectral,
of pests during the production of rice, which can help the rice field TIN-based structural and meteorological features, Remote Sens. 11 (7) (2019)
owner to take preventive actions immediately in order to minimize 890.
the wastage of rice. The different preventive actions can be taken as [4] Kshitij Srivastava, Aman Jain Bhutoria, Jyoti K. Sharma, Aakash Sinha,
Prem Chandra Pandey, UAVs technology for the development of GUI based
per the identification of types of rice pests, such as Leafhopper, Insect,
application for precision agriculture and environmental research, Remote Sens.
Arthropod and Cricket, by the UAVs. Appl.: Soc. Environ. 16 (2019) 100258.
[5] Mehmet Doğan Altınbaş, Tacha Serif, Detecting defected crops: Precision
5. Conclusion agriculture using haar classifiers and UAV, in: International Conference on
Mobile Web and Intelligent Information Systems, Springer, 2019, pp. 27–40.
[6] Yufei Liu, Noboru Noguchi, Lingguang Liang, Development of a positioning
This paper proposed an IoT assisted UAV based pest detection model system using UAV-based computer vision for an airboat navigation in paddy
to identify the pests in the rice during its production in the field. field, Comput. Electron. Agric. 162 (2019) 126–133.

8
S.K. Bhoi et al. Microprocessors and Microsystems 80 (2021) 103607

[7] Luís Pádua, Pedro Marques, Telmo Adão, Nathalie Guimarães, António Sousa, [30] Tao Sun, Mining and utilization of special information for archives management
Emanuel Peres, Joaquim João Sousa, Vineyard variability analysis through UAV- based on 5G network and internet of things, Microprocess. Microsyst. (2020)
based vigour maps to assess climate change impacts, Agronomy 9 (10) (2019) 103410.
581. [31] Y. Arockia Jesuraj, K. Hemalatha, A prototype model of unmanned automatic
[8] Qi Yang, Liangsheng Shi, Jinye Han, Yuanyuan Zha, Penghui Zhu, Deep level crossing system using piezoelectric sensor, Microprocess. Microsyst. 79
convolutional neural networks for rice grain yield estimation at the ripening (2020) 103265.
stage using UAV-based remotely sensed images, Field Crops Res. 235 (2019) [32] Xi Niu, Xiaodong Yuan, Yongwei Zhou, Hehua Fan, UAV track planning based
142–153. on evolution algorithm in embedded system, Microprocess. Microsyst. (2020)
[9] Guobin Wang, Yubin Lan, Haixia Qi, Pengchao Chen, Andrew Hewitt, Yuxing 103068.
Han, Field evaluation of an unmanned aerial vehicle (UAV) sprayer: effect of [33] S. Vimal, Manju Khari, Rubén González Crespo, L. Kalaivani, Nilanjan Dey,
spray volume on deposition and the control of pests and disease in wheat, Pest Madasamy Kaliappan, Energy enhancement using multiobjective ant colony
Manage. Sci. 75 (6) (2019) 1546–1555. optimization with double Q learning algorithm for IoT based cognitive radio
[10] Oscar Barrero, Sammy A. Perdomo, RGB and multispectral UAV image fusion networks, Comput. Commun. 154 (2020) 481–490.
for gramineae weed detection in rice fields, Precis. Agric. 19 (5) (2018) [34] S. Vimal, Manju Khari, Nilanjan Dey, Rubén González Crespo, Y. Harold
809–822. Robinson, Enhanced resource allocation in mobile edge computing using
[11] Yu Li, Meiyu Qian, Pengfeng Liu, Qian Cai, Xiaoying Li, Junwen Guo, Huan reinforcement learning based MOACO algorithm for IIOT, Comput. Commun.
Yan, Fengyuan Yu, Kun Yuan, Juan Yu, et al., The recognition of rice images 151 (2020) 355–364.
by UAV based on capsule network, Cluster Comput. 22 (4) (2019) 9515–9524. [35] Hongyu Chen, Bo Zhou, Environmental performance evaluation of green build-
[12] Nguyen Cao Tri, Hieu N. Duong, Tran Van Hoai, Tran Van Hoa, Vu H. ings based on machine learning and IOT systems, Microprocess. Microsyst.
Nguyen, Nguyen Thanh Toan, Vaclav Snasel, A novel approach based on deep (2020) 103496.
learning techniques and UAVs to yield assessment of paddy fields, in: 2017 9th [36] Kangkang Cheng, Smart rural financial innovation based on 5g network and
International Conference on Knowledge and Systems Engineering (KSE), IEEE, internet of things, Microprocess. Microsyst. (2020) 103500.
2017, pp. 257–262. [37] Gopal Krishna Patro Sunkuru, Kishore Mishra Brojo, Kumar Panda Sanjaya,
[13] Lei Feng, Weikang Wu, Junmin Wang, Chu Zhang, Yiying Zhao, Susu Zhu, Yong Kumar Raghvendra, Viet Long Hoang, Taniar David, Priyadarshini Ishaani, SLA-
He, Wind field distribution of multi-rotor UAV and its influence on spectral based task scheduling algorithms for heterogeneous multi-cloud environment,
information acquisition of rice canopies, Remote Sens. 11 (6) (2019) 602. IEEE Access 8 (2020) 90978–90991.
[14] Jeongeun Kim, Seungwon Kim, Chanyoung Ju, Hyoung Il Son, Unmanned [38] Krishnamoorthy Devarajan, Vaiyapuri Padmathilagam, Ayyanar Ayyasamy,
aerial vehicles in agriculture: A review of perspective of platform, control, and Y. Harold Robinson, Kumar Raghvendra, Viet Long Hoang, Hoang Son Le, An
applications, IEEE Access 7 (2019) 105100–105115. effective congestion control scheme for MANET with relative traffic link matrix
[15] Xun Wang, Zheng Duan, Mikkel Brydegaard, Sune Svanberg, Guangyu Zhao, routing, Arab. J. Sci. Eng. 45 (2020) 6171–6181.
Drone-based area scanning of vegetation fluorescence height profiles using a [39] Ali Sunyaev, Cloud computing, in: Internet Computing, Springer, 2020, pp.
miniaturized hyperspectral lidar system, Appl. Phys. B 124 (11) (2018) 207. 195–236.
[16] Wei-Cai Qin, Bai-Jing Qiu, Xin-Yu Xue, Chen Chen, Zhu-Feng Xu, Qing-Qing
[40] Sara Mahmoud, Imad Jawhar, Nader Mohamed, Jie Wu, UAV and WSN
Zhou, Droplet deposition and control effect of insecticides sprayed with an
softwarization and collaboration using cloud computing, in: 2016 3rd Smart
unmanned aerial vehicle against plant hoppers, Crop Prot. 85 (2016) 79–88.
Cloud Networks & Systems (SCNS), IEEE, 2016, pp. 1–8.
[17] Anjan Chamuah, Rajbeer Singh, Securing sustainability in Indian agriculture
[41] Sara Mahmoud, Nader Mohamed, Jameela Al-Jaroodi, Integrating uavs into the
through civilian UAV: a responsible innovation perspective, SN Appl. Sci. 2 (1)
cloud using the concept of the web of things, J. Robot. 2015 (2015).
(2020) 106.
[42] Marouane Salhaoui, Antonio Guerrero-González, Mounir Arioua, Francisco J.
[18] Mahyar Aboutalebi, Alfonso F. Torres-Rua, Mac McKee, William P. Kustas,
Ortiz, Ahmed El Oualkadi, Carlos Luis Torregrosa, Smart industrial IoT mon-
Hector Nieto, Maria Mar Alsina, Alex White, John H. Prueger, Lynn McKee,
itoring and control system based on UAV and cloud computing applied to a
Joseph Alfieri, et al., Incorporation of unmanned aerial vehicle (UAV) point
concrete plant, Sensors 19 (15) (2019) 3316.
cloud products into remote sensing evapotranspiration models, Remote Sens.
[43] Chirag Modi, Dhiren Patel, Bhavesh Borisaniya, Avi Patel, Muttukrishnan
12 (1) (2020) 50.
Rajarajan, A survey on security issues and solutions at different layers of cloud
[19] Mohammad Mozaffari, Walid Saad, Mehdi Bennis, Young-Han Nam, Mérouane
computing, J. Supercomput. 63 (2) (2013) 561–592.
Debbah, A tutorial on UAVs for wireless networks: Applications, challenges, and
[44] Sanjaya K. Panda, Prasanta K. Jana, Efficient task scheduling algorithms
open problems, IEEE Commun. Surv. Tutor. 21 (3) (2019) 2334–2360.
for heterogeneous multi-cloud environment, J. Supercomput. 71 (4) (2015)
[20] Syeda Airas Burhan, Sidra Minhas, Amara Tariq, Muhammad Nabeel Hassan,
1505–1533.
Comparative study of deep learning algorithms for disease and pest detection
[45] Sanjaya K. Panda, Prasanta K. Jana, SLA-based task scheduling algorithms
in rice crops, in: 2020 12th International Conference on Electronics, Computers
for heterogeneous multi-cloud environment, J. Supercomput. 73 (6) (2017)
and Artificial Intelligence (ECAI), IEEE, 2020, pp. 1–5.
2730–2762.
[21] Cecilia Montauban, Maria Mas, Owen S. Wangensteen, Víctor Sarto i Monteys,
David Gisbert Fornós, Xavi Ferré Mola, Adrià López-Baucells, Bats as natural [46] Sanjaya K. Panda, Indrajeet Gupta, Prasanta K. Jana, Task scheduling algorithms
samplers: First record of the invasive pest rice water weevil lissorhoptrus for multi-cloud systems: allocation-aware approach, Inf. Syst. Front. (2017)
oryzophilus in the iberian peninsula, Crop Prot. (2020) 105427. 1–19.
[22] Harshita Nagar, R.S. Sharma, A comprehensive survey on pest detection [47] Sanjaya K. Panda, Prasanta K. Jana, An energy-efficient task scheduling al-
techniques using image processing, in: 2020 4th International Conference on gorithm for heterogeneous cloud computing systems, Cluster Comput. (2018)
Intelligent Computing and Control Systems (ICICCS), IEEE, 2020, pp. 43–48. 1–19.
[23] Chowdhury R. Rahman, Preetom S. Arko, Mohammed E. Ali, Mohammad [48] Sanjaya K. Panda, Prasanta K. Jana, Normalization-based task scheduling
A. Iqbal Khan, Sajid H. Apon, Farzana Nowrin, Abu Wasif, Identification and algorithms for heterogeneous multi-cloud environment, Inf. Syst. Front. 20 (2)
recognition of rice diseases and pests using convolutional neural networks, (2018) 373–399.
Biosyst. Eng. 194 (2020) 112–120. [49] Suresh Annamalai, R. Udendhran, S. Vimal, An intelligent grid network based
[24] Fangyuan Wang, Rujing Wang, Chengjun Xie, Po Yang, Liu Liu, Fusing multi- on cloud computing infrastructures, in: Novel Practices and Trends in Grid and
scale context-aware information representation for automatic in-field pest Cloud Computing, IGI Global, 2019, pp. 59–73.
detection and recognition, Comput. Electron. Agric. 169 (2020) 105222. [50] Suresh Annamalai, R. Udendhran, S. Vimal, Cloud-based predictive maintenance
[25] Fukuyo Tanaka, Yukio Magariyama, Akihiro Miyanoshita, Volatile biomark- and machine monitoring for intelligent manufacturing for automobile industry,
ers for early-stage detection of insect-infested brown rice: Isopentenols and in: Novel Practices and Trends in Grid and Cloud Computing, IGI Global, 2019,
polysulfides, Food Chem. 303 (2020) 125381. pp. 74–89.
[26] Réda Nouacer, Mahmoud Hussein, Huascar Espinoza, Yassine Ouhammou, [51] S. Sudhakar Ilango, S. Vimal, M. Kaliappan, P. Subbulakshmi, Optimization
Matheus Ladeira, Rodrigo Castiñeira, Towards a framework of key technologies using artificial bee colony based clustering approach for big data, Cluster
for drones, Microprocess. Microsyst. (2020) 103142. Comput. 22 (5) (2019) 12169–12177.
[27] Pedro Castillejo, Gorm Johansen, Baran Cürüklü, Sonia Bilbao-Arechabala, [52] Shuwen Wangfi, Wenying Wang, Yu Tan, Internet cross-border service model
Roberto Fresco, Belén Martínez-Rodríguez, Luigi Pomante, Cristina Rusu, José- based on 5g environment and cloud computing data platform, Microprocess.
Fernán Martínez-Ortega, Carlo Centofanti, et al., Aggregate farming in the Microsyst. (2020) 103520.
cloud: The AFarCloud ECSEL project, Microprocess. Microsyst. 78 (2020) [53] Imagga, Build the next generation of image recognition applications with
103218. imagga’s API, 2020, https://imagga.com/. Online; accessed 29 January 2020.
[28] C. Sindhu, G. Vadivu, Fine grained sentiment polarity classification using [54] Python, Python, 2020, https://www.python.org/. Online; accessed 29 January
augmented knowledge sequence-attention mechanism, Microprocess. Microsyst. 2020.
(2020) 103365. [55] Muhammad Ayaz, Mohammad Ammad-Uddin, Zubair Sharif, Ali Mansour,
[29] Divya Nath, Prabhu Ramanathan, Interfaced circuit using a non-destructive El-Hadi M Aggoune, Internet-of-things (IoT)-based smart agriculture: Toward
method for moisture measurement, Microprocess. Microsyst. 73 (2020) 102951. making the fields talk, IEEE Access 7 (2019) 129551–129583.

9
S.K. Bhoi et al. Microprocessors and Microsystems 80 (2021) 103607

[56] Samuel C. Hassler, Fulya Baysal-Gurel, Unmanned aircraft system (UAS) [79] Robert Martin C. Santiago, Stephenn L. Rabano, Robert Kerwin D. Billones,
technology and applications in agriculture, Agronomy 9 (10) (2019) 618. Edwin J. Calilung, Edwin Sybingco, Elmer P. Dadios, Insect detection and
[57] Nuttakarn Kitpo, Masahiro Inoue, Early rice disease detection and position monitoring in stored grains using MFCCs and artificial neural network, in:
mapping system using drone and IoT architecture, in: 2018 12th South East TENCON 2017-2017 IEEE Region 10 Conference, IEEE, 2017, pp. 2542–2547.
Asian Technical University Consortium (SEATUC), Vol. 1, IEEE, 2018, pp. 1–5. [80] Chunhua Zhu, Jiaojiao Wang, Hao Liu, Huan Mi, Insect identification and
[58] Luís Pádua, Telmo Adão, Jonáš Hruška, Joaquim J. Sousa, Emanuel Peres, counting in stored grain: Image processing approach and application embedded
Raul Morais, António Sousa, Very high resolution aerial data to support multi- in smartphones, Mob. Inf. Syst. 2018 (2018).
temporal precision agriculture information management, Procedia Comput. Sci. [81] Barbara J. Tigar, Andrew S. Hursthouse, Using elemental profiling to determine
121 (2017) 407–414. intrinsic markers to track the dispersal of P rostephanus truncatus, a pest of
[59] Yao Qin, Yanli Wu, Qifu Wang, Suping Yu, Method for pests detecting in stored stored grain with alternative natural hosts, Entomol. Exp. Appl. 160 (1) (2016)
grain based on spectral residual saliency edge detection, Grain Oil Sci. Technol. 83–90.
[82] Tobias Engl, Nadia Eberl, Carla Gorse, Theresa Krüger, Thorsten H.P. Schmidt,
2 (2) (2019) 33–38.
Rudy Plarre, Cornel Adler, Martin Kaltenpoth, Ancient symbiosis confers
[60] Yufeng Shen, Huiling Zhou, Jiangtao Li, Fuji Jian, Digvir S. Jayas, Detection of
desiccation resistance to stored grain pest beetles, Mol. Ecol. 27 (8) (2018)
stored-grain insects using deep learning, Comput. Electron. Agric. 145 (2018)
2095–2108.
319–325.
[83] S. Neethirajan, C. Karunakaran, D.S. Jayas, N.D.G. White, Detection techniques
[61] Mireia Solà, Jordi Riudavets, Nuria Agustí, Detection and identification of five for stored-product insects in grain, Food Control 18 (2) (2007) 157–162.
common internal grain insect pests by multiplex PCR, Food Control 84 (2018) [84] N.V. Maslekar, Kiran P. Kulkarni, Akshay Kumar Chakravarthy, Application
246–254. of unmanned aerial vehicles (UAVs) for pest surveillance, monitoring and
[62] Rekha Kaushik, Jyoti Singhai, An approach for the development of a sensing management, in: Innovative Pest Management Approaches for the 21st Century,
system to monitor contamination in stored grain, in: 2019 6th International Springer, 2020, pp. 27–45.
Conference on Signal Processing and Integrated Networks (SPIN), IEEE, 2019, [85] Qi Yang, Liangsheng Shi, Jingye Han, Jin Yu, Kai Huang, A near real-time deep
pp. 880–884. learning approach for detecting rice phenology based on UAV images, Agricult.
[63] Ranjana Kumari, Lakshmi E. Jayachandran, Ananta K. Ghosh, Investigation Forest Meteorol. 287 (2020) 107938.
of diversity and dominance of fungal biota in stored wheat grains from [86] Ying Yang, Bo Peng, Jianqin Wang, A system for detection and recognition
governmental warehouses in West Bengal, India, J. Sci. Food Agric. 99 (7) of pests in stored-grain based on video analysis, in: International Conference
(2019) 3490–3500. on Computer and Computing Technologies in Agriculture, Springer, 2010, pp.
[64] Liu Liu, Rujing Wang, Chengjun Xie, Po Yang, Fangyuan Wang, Sud 119–124.
Sudirman, Wancai Liu, Pestnet: An end-to-end deep learning approach for [87] Demin Gao, Quan Sun, Bin Hu, Shuo Zhang, A framework for agricultural
large-scale multi-class pest detection and classification, IEEE Access 7 (2019) pest and disease monitoring based on internet-of-things and unmanned aerial
45301–45312. vehicles, Sensors 20 (5) (2020) 1487.
[65] J. Priyadarsini, B. Naveen Karthick, K. Karthick, B. Karthikeyan, S. Mohan, [88] David Elmouttie, Andreas Kiermeier, Grant Hamilton, Improving detection
Detection of pH value and pest control for eco-friendly agriculture, in: 2019 5th probabilities for pests in stored grain, Pest Manage. Sci. 66 (12) (2010)
International Conference on Advanced Computing & Communication Systems 1280–1286.
(ICACCS), IEEE, 2019, pp. 801–804. [89] Panagiotis A. Eliopoulos, Ilyas Potamitis, Dimitris Ch. Kontodimas, Estimation
[66] Newton Glen, Oksana Korol, Levesque Andre, Favrin Robert, Graefenham Tom, of population density of stored grain pests via bioacoustic detection, Crop Prot.
Extracting pest risk information from risk assessment documents, in: 2019 85 (2016) 71–78.
[90] Achilles D. Boursianis, Maria S. Papadopoulou, Panagiotis Diamantoulakis,
ACM/IEEE Joint Conference on Digital Libraries (JCDL), IEEE, 2019, pp.
Aglaia Liopa-Tsakalidi, Pantelis Barouchas, George Salahas, George Karagianni-
368–369.
dis, Shaohua Wan, Sotirios K. Goudos, Internet of things (IoT) and agricultural
[67] Stephen M. Losey, Gregory J. Daglish, Thomas W. Phillips, Orientation of
unmanned aerial vehicles (UAVs) in smart farming: A comprehensive review,
rusty grain beetles, cryptolestes ferrugineus (Coleoptera: Laemophloeidae), to
Internet Things (2020) 100187.
semiochemicals in field and laboratory experiments, J. Stored Prod. Res. 84
[91] Natalia Stefanazzi, Teodoro Stadler, Adriana Ferrero, Composition and toxic,
(2019) 101513.
repellent and feeding deterrent activity of essential oils against the stored-grain
[68] Anastasia Njoroge, Hippolyte Affognon, Uwe Richter, Oliver Hensel, Barukh
pests tribolium castaneum (coleoptera: Tenebrionidae) and sitophilus oryzae
Rohde, Davie Chen, Richard Mankin, Acoustic, pitfall trap, and visual surveys
(coleoptera: Curculionidae), Pest Manage. Sci. 67 (6) (2011) 639–646.
of stored product insect pests in Kenyan warehouses, Insects 10 (4) (2019) 105. [92] V. Stejskal, R. Aulickỳ, Z. Kučerová, J Lukáš, Method of sampling and laboratory
[69] Fuji Jian, Influences of stored product insect movements on integrated pest extraction affects interpretation of grain infestation by storage pests, J. Plant
management decisions, Insects 10 (4) (2019) 100. Dis. Prot. 115 (3) (2008) 129–133.
[70] Graham A. McCulloch, S. Mohankumar, S. Subramanian, T. Sonai Rajan, [93] Mohd Abas Shah, Akhtar Ali Khan, Imaging techniques for the detection of
C. Rahul, R. Surendran, R. Gaurav, S. Chandrasekaran, Gregory J. Daglish, stored product pests, Appl. Entomol. Zool. 49 (2) (2014) 201–212.
Gimme H. Walter, Contrasting patterns of phylogeographic structuring in two [94] Cristian Ramirez Atencia, Javier Del Ser, David Camacho, Weighted strategies to
key beetle pests of stored grain in India and Australia, J. Pest Sci. 92 (3) (2019) guide a multi-objective evolutionary algorithm for multi-UAV mission planning,
1249–1259. Swarm Evol. Comput. 44 (2019) 480–495.
[71] Km Sheetal Banga, Nachiket Kotwaliwale, Debabandya Mohapatra, Saroj Kumar [95] Government of Western Australia, Insect pests of stored grain, 2020, https:
Giri, Techniques for insect detection in stored food grains: An overview, Food //www.agric.wa.gov.au/pest-insects/insect-pests-stored-grain. Online; accessed
Control 94 (2018) 167–176. 29 January 2020.
[72] Gregory J. Daglish, Manoj K. Nayak, Frank H. Arthur, Christos G. Athanassiou, [96] Jha Sudan, Prashar Deepak, Viet Long Hoang, Taniar David, Recurrent neural
Insect pest management in stored grain, in: Recent Advances in Stored Product network for detecting malware, Comput. Secur. 99 (2020) 1–13.
Protection, Springer, 2018, pp. 45–63. [97] Sunkuru Gopal Krishna Patro, Brojo Kishore Mishra, Sanjaya Kumar Panda,
[73] Christos G. Athanassiou, Christos I. Rumbos, Emerging pests in durable stored Raghvendra Kumar, Hoang Viet Long, Tran Manh Tuan, Knowledge-based
products, in: Recent Advances in Stored Product Protection, Springer, 2018, pp. preference learning model for recommender system using adaptive neuro-fuzzy
211–227. inference system, J. Intell. Fuzzy Systems 39 (2020) 4651–4665.
[98] Gopal Krishna Patro Sunkuru, Kishore Mishra Brojo, Kumar Panda San-
[74] Gilad Golden, Elazar Quinn, Eli Shaaya, Moshe Kostyukovsky, Elena Poverenov,
jaya, Kumar Raghvendra, Viet Long Hoang, Taniar David, Priyadarshini
Coarse and nano emulsions for effective delivery of the natural pest control
Ishaani, A hybrid action-related K-nearest neighbour (HAR-KNN) approach for
agent pulegone for stored grain protection, Pest Manage. Sci. 74 (4) (2018)
recommendation systems, IEEE Access 8 (2020) 90978–90991.
820–827.
[99] R. Santhana Krishnan, E. Golden Julie, Y. Harold Robinson, Kumar Raghvendra,
[75] Fiaz Ahmad, Baijing Qiu, Xiaoya Dong, Jing Ma, Xin Huang, Shibbir Ahmed,
Hoang Son Le, Anh Tuan Tong, Viet Long Hoang, Modified zone based intrusion
Farman Ali Chandio, Effect of operational parameters of UAV sprayer on spray
detection system for security enhancement in mobile ad hoc networks, Wirel.
deposition pattern in target and off-target zones during outer field weed control
Netw. 26 (2020) 1275–1289.
application, Comput. Electron. Agric. 172 (2020) 105350. [100] Pritam Nakul, Khari Manju, Hoang Son Le, Kumar Raghvendra, Jha Sudan,
[76] V. Stejskal, J. Hubert, R. Aulicky, Z. Kucerova, Overview of present and past and Priyadarshini Ishaani, Abdel-Basset Mohamed, Viet Long Hoang, Assessment of
pest-associated risks in stored food and feed products: European perspective, J. code smell for predicting class change proneness using machine learning, IEEE
Stored Prod. Res. 64 (2015) 122–132. Access 7 (2019) 37414–37425.
[77] N.E.B. Hammond, D. Hardie, C.E. Hauser, S.A. Reid, Can general surveillance [101] Viet Long Hoang, Ali Mumtaz, Hoang Son Le, Khan Mohsin, Ngoc Tu Doan, A
detect high priority pests in the Western Australian grains industry? Crop Prot. novel approach for fuzzy clustering based on neutrosophic association matrix,
79 (2016) 8–14. Comput. Ind. Eng. 127 (2019) 687–697.
[78] Y.-Y. Li, P.G. Fields, B.-P. Pang, P.C. Coghlin, K.D. Floate, Prevalence and [102] Jha Sudan, Hoang Son Le, Kumar Raghvendra, Priyadarshini Ishaani, Smaran-
diversity of Wolbachia bacteria infecting insect pests of stored products, J. dache Florentin, Viet Long Hoang, Neutrosophic image segmentation with dice
Stored Prod. Res. 62 (2015) 93–100. coefficients, Measurement 134 (2019) 762–772.

10
S.K. Bhoi et al. Microprocessors and Microsystems 80 (2021) 103607

[103] Arindam Dey, Aayush Agarwal, Pranav Dixit, Hoang Viet Long, Frank Werner, Dr. Hoang Viet Long is currently working as the researcher
Tandra Pal, Le Hoang Son, A genetic algorithm for total graph coloring, J. of Institute for Computational Science at Ton Duc Thang
Intell. Fuzzy Systems 37 (2019) 7831–7838. University, Ho Chi Minh City, Vietnam. He has been pro-
moted to Associate Professor in Information Technology
since 2017. Recently, he has been concerning in Cybersecu-
rity, Machine Learning and published more than 50 papers
Dr. Sourav Kumar Bhoi is working as an Assistant Profes- in ISI-covered journal.
sor in the Department of CSE at PMEC, Berhampur, India.
His research interests include Ad-Hoc and Sensor Networks,
Internet of Things and Security. Dr. Bhoi received the IET
Premium Award 2016 from IET Networks, UK. Dr. Bhoi is
a member of IEEE. Dr. Bhoi has published more than 60
papers in reputed international journals and conferences, Dr. Raghvendra Kumar is working as Associate Professor
and acted as reviewers in many international journals, in Computer Science and Engineering Department at GIET
including IEEE, Elsevier Science, Springer, Wiley, Hindawi University, India. He has published number of research
and many more. papers in international journal (SCI/SCIE/ESCI/Scopus) and
conferences including IEEE and Springer as well as serve as
organizing chair (RICE-2019, 2020), volume Editor (RICE-
Dr. Kalyan Kumar Jena is working as an Assistant Pro-
2018), Keynote speaker, session chair, Co-chair, publicity
fessor in the Department of CSE at PMEC, Berhampur,
chair, publication chair, advisory board, Technical program
India. His research interests include image processing and
Committee members in many international and national
internet of things. He received the BPUT gold medal for his
conferences and serve as guest editors in many special issues
outstanding performance in M. Tech. (CSE) and published
from reputed journals (Indexed By: Scopus, ESCI, SCI).
more than 30 papers in reputed journals and conferences,
and acted as reviewers in many international journals and
conferences. Dr. Subbulakshmi Pasupathi is working as Assistant pro-
fessor (Senior Grade), School of Computer Science and
Engineering, Vellore Institute of Technology, Chennai, Tamil
Nadu, India. She has around 10 years of teaching ex-
perience. Her modest areas of interest include Cognitive
Dr. Sanjaya Kumar Panda is working as an Assistant
Radio Networks, Computer networks, Cryptography, Wire-
Professor in the Department of CSE at NIT Warangal,
less Networks & security, Big data analytics, Game theory
Telangana, India. He worked as an Assistant Professor and
and Machine Learning. She has mentored various MHRD
Head of the Department, CSE at IIITDM Kurnool, Andhra
certifications and institutional expert member in Outcome
Pradesh, India and also worked as an Assistant Professor in
Based Education-NBA.
the Department of IT at VSSUT, Burla, Odisha, India. He
has published more than 80 papers in reputed journals and
conferences.

11

You might also like